Главная
Study mode:
on
1
Intro
2
A Holistic Outlook on Mobile Security
3
The Physical Layer
4
Real World Incident Statistics
5
Network Based Attacks
6
Implementation-Based Vulnerabilities
7
Gotofail - The Code
8
Design-Based Vulnerabilities (Generic)
9
IOS Security Model
10
Configuration Profiles
11
Demo: Participation Instructions
12
Malicious Profiles
13
Design-Based Vulnerabilities (Mobile)
14
App Level Security & Privacy
15
App Level Vulnerabilities
16
Certificate Pinning
17
HRH - Attack Flow
18
Google's Focus on Malware
19
The Maliciously Vulnerable App
20
Summary
Description:
Explore emerging mobile security threats in this 48-minute conference talk from AppSecUSA 2014. Delve into real-world attacks on mobile devices, covering physical, network, and application-level vulnerabilities. Learn about iOS malicious profiles, HTTP Request Hijacking, and other covert techniques employed by hackers. Gain insights from industry experts Yair Amit and Adi Sharabani as they present examples, statistics, and demonstrations of mobile security risks. Topics covered include the iOS security model, configuration profiles, certificate pinning, and Google's focus on malware. Understand the holistic outlook on mobile security and discover implementation and design-based vulnerabilities affecting mobile devices worldwide.

Mobile Security Attacks - A Glimpse from the Trenches

OWASP Foundation
Add to list
0:00 / 0:00